<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 14 May 2026 10:19:50 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Artificial Intelligence”</title>
    <link>https://securityconversations.fireside.fm/tags/artificial%20intelligence</link>
    <pubDate>Sat, 28 Sep 2024 12:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Exploding beepers, critical CUPS flaws, Windows Recall rebuilt for security</title>
  <link>http://securityconversations.fireside.fm/tbp-ep14</link>
  <guid isPermaLink="false">7bd21833-9dcc-4396-a991-be2d3271f727</guid>
  <pubDate>Sat, 28 Sep 2024 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7bd21833-9dcc-4396-a991-be2d3271f727.mp3" length="63398046" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 14: The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky's controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon.

This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</itunes:subtitle>
  <itunes:duration>1:19:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7bd21833-9dcc-4396-a991-be2d3271f727/cover.jpg?v=1"/>
  <description>&lt;p&gt;&lt;strong&gt;Three Buddy Problem - Episode 14&lt;/strong&gt;:  The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky's controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon.&lt;/p&gt;

&lt;p&gt;(&lt;em&gt;This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.&lt;/em&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cast:&lt;/strong&gt; Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).&lt;/p&gt;
</description>
  <itunes:keywords>LABScon, Windows Recall, CrowdStrike, Kaspersky, UltraAV, Artificial Intelligence</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 14</strong>:  The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky&#39;s controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon.</p>

<p>(<em>This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.</em>)</p>

<p><strong>Cast:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="The Consolation of Threat Intel (JAG-S LABScon keynote)" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">The Consolation of Threat Intel (JAG-S LABScon keynote)</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Windows Recall gets major security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Windows Recall gets major security makeover</a></li><li><a title="David Weston on Windows Recall security reboot" rel="nofollow" href="https://blogs.windows.com/windowsexperience/2024/09/27/update-on-recall-security-and-privacy-architecture/">David Weston on Windows Recall security reboot</a></li><li><a title="Critical Linux CUPS remote code execution " rel="nofollow" href="https://www.theregister.com/2024/09/26/cups_linux_rce_disclosed/">Critical Linux CUPS remote code execution </a></li><li><a title="How Israel Built Exploding Pagers" rel="nofollow" href="https://archive.ph/kKDVy">How Israel Built Exploding Pagers</a> &mdash; How Israel Built a Modern-Day Trojan Horse: Exploding Pagers</li><li><a title="Apple Suddenly Drops NSO Group Spyware Lawsuit" rel="nofollow" href="https://www.securityweek.com/apple-suddenly-drops-nso-group-spyware-lawsuit/">Apple Suddenly Drops NSO Group Spyware Lawsuit</a></li><li><a title="CrowdStrike Overhauls Testing and Rollout Procedures" rel="nofollow" href="https://www.securityweek.com/crowdstrike-overhauls-testing-and-rollout-procedures-to-avoid-bsod-crashes/">CrowdStrike Overhauls Testing and Rollout Procedures</a></li><li><a title="Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek" rel="nofollow" href="https://www.securityweek.com/post-crowdstrike-fallout-microsoft-redesigning-edr-vendor-access-to-windows-kernel/">Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek</a></li><li><a title="Kaspersky Sparks Outrage as UltraAV Takes Over Systems Without Consent" rel="nofollow" href="https://www.securityweek.com/users-quick-to-remove-ultraav-after-silent-transition-from-kaspersky-antivirus/">Kaspersky Sparks Outrage as UltraAV Takes Over Systems Without Consent</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10P5vAvj_MQplH8XPtYKr6mGuNVhPjxZePgI5y4cKPBw/edit#heading=h.rbgx0o903h7o">Transcript (unedited, AI-generated)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 14</strong>:  The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky&#39;s controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon.</p>

<p>(<em>This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.</em>)</p>

<p><strong>Cast:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="The Consolation of Threat Intel (JAG-S LABScon keynote)" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">The Consolation of Threat Intel (JAG-S LABScon keynote)</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Windows Recall gets major security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Windows Recall gets major security makeover</a></li><li><a title="David Weston on Windows Recall security reboot" rel="nofollow" href="https://blogs.windows.com/windowsexperience/2024/09/27/update-on-recall-security-and-privacy-architecture/">David Weston on Windows Recall security reboot</a></li><li><a title="Critical Linux CUPS remote code execution " rel="nofollow" href="https://www.theregister.com/2024/09/26/cups_linux_rce_disclosed/">Critical Linux CUPS remote code execution </a></li><li><a title="How Israel Built Exploding Pagers" rel="nofollow" href="https://archive.ph/kKDVy">How Israel Built Exploding Pagers</a> &mdash; How Israel Built a Modern-Day Trojan Horse: Exploding Pagers</li><li><a title="Apple Suddenly Drops NSO Group Spyware Lawsuit" rel="nofollow" href="https://www.securityweek.com/apple-suddenly-drops-nso-group-spyware-lawsuit/">Apple Suddenly Drops NSO Group Spyware Lawsuit</a></li><li><a title="CrowdStrike Overhauls Testing and Rollout Procedures" rel="nofollow" href="https://www.securityweek.com/crowdstrike-overhauls-testing-and-rollout-procedures-to-avoid-bsod-crashes/">CrowdStrike Overhauls Testing and Rollout Procedures</a></li><li><a title="Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek" rel="nofollow" href="https://www.securityweek.com/post-crowdstrike-fallout-microsoft-redesigning-edr-vendor-access-to-windows-kernel/">Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek</a></li><li><a title="Kaspersky Sparks Outrage as UltraAV Takes Over Systems Without Consent" rel="nofollow" href="https://www.securityweek.com/users-quick-to-remove-ultraav-after-silent-transition-from-kaspersky-antivirus/">Kaspersky Sparks Outrage as UltraAV Takes Over Systems Without Consent</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10P5vAvj_MQplH8XPtYKr6mGuNVhPjxZePgI5y4cKPBw/edit#heading=h.rbgx0o903h7o">Transcript (unedited, AI-generated)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Rob Ragan on the excitement of AI solving security problems</title>
  <link>http://securityconversations.fireside.fm/rob-ragan-artificial-intelligence-future-of-security</link>
  <guid isPermaLink="false">5d290c85-90a8-4e41-8e9b-f8c953259be4</guid>
  <pubDate>Thu, 07 Dec 2023 07:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5d290c85-90a8-4e41-8e9b-f8c953259be4.mp3" length="41368098" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the firmware security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the leapfrog potential of AI models and their impact on various aspects of technology and  society.</itunes:subtitle>
  <itunes:duration>51:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5d290c85-90a8-4e41-8e9b-f8c953259be4/cover.jpg?v=1"/>
  <description>&lt;p&gt;&lt;strong&gt;Episode sponsors:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Binarly (&lt;a href="https://binarly.io" target="_blank" rel="nofollow noopener"&gt;https://binarly.io&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;FwHunt (&lt;a href="https://fwhunt.run" target="_blank" rel="nofollow noopener"&gt;https://fwhunt.run&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. &lt;/p&gt;

&lt;p&gt;We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaways:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.&lt;/li&gt;
&lt;li&gt;Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization's security posture.&lt;/li&gt;
&lt;li&gt;Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.&lt;/li&gt;
&lt;li&gt;AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.&lt;/li&gt;
&lt;li&gt;AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.&lt;/li&gt;
&lt;li&gt;Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.&lt;/li&gt;
&lt;li&gt;Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries.&lt;br&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>artificial intelligence, generative-ai, LLMs, bug bounties, automation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. </p>

<p>We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.</p>

<p><strong>Takeaways:</strong></p>

<ul>
<li>Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.</li>
<li>Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization&#39;s security posture.</li>
<li>Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.</li>
<li>AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.</li>
<li>AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.</li>
<li>Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.</li>
<li>Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries. </li>
</ul><p>Links:</p><ul><li><a title="Rob Ragan&#39;s Theoradical.ai" rel="nofollow" href="https://theoradical.ai/">Rob Ragan's Theoradical.ai</a></li><li><a title="Testing LLM Algorithms While AI Tests Us" rel="nofollow" href="https://slides.com/robragan/testing-llms">Testing LLM Algorithms While AI Tests Us</a> &mdash; Testing LLM Algorithms While AI Tests Us</li><li><a title="LLM Testing Findings Templates" rel="nofollow" href="https://github.com/BishopFox/llm-testing-findings/blob/main/README.md">LLM Testing Findings Templates</a> &mdash; This collection of open-source templates is designed to facilitate the reporting and documentation of vulnerabilities and opportunities for usability improvement in LLM integrations and applications.</li><li><a title="Rob Ragan on Twitter" rel="nofollow" href="https://twitter.com/sweepthatleg">Rob Ragan on Twitter</a></li><li><a title="Rob Ragan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/robragan/">Rob Ragan on LinkedIn</a></li><li><a title="Bishop Fox Labs" rel="nofollow" href="https://bishopfox.com/labs">Bishop Fox Labs</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. </p>

<p>We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.</p>

<p><strong>Takeaways:</strong></p>

<ul>
<li>Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.</li>
<li>Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization&#39;s security posture.</li>
<li>Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.</li>
<li>AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.</li>
<li>AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.</li>
<li>Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.</li>
<li>Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries. </li>
</ul><p>Links:</p><ul><li><a title="Rob Ragan&#39;s Theoradical.ai" rel="nofollow" href="https://theoradical.ai/">Rob Ragan's Theoradical.ai</a></li><li><a title="Testing LLM Algorithms While AI Tests Us" rel="nofollow" href="https://slides.com/robragan/testing-llms">Testing LLM Algorithms While AI Tests Us</a> &mdash; Testing LLM Algorithms While AI Tests Us</li><li><a title="LLM Testing Findings Templates" rel="nofollow" href="https://github.com/BishopFox/llm-testing-findings/blob/main/README.md">LLM Testing Findings Templates</a> &mdash; This collection of open-source templates is designed to facilitate the reporting and documentation of vulnerabilities and opportunities for usability improvement in LLM integrations and applications.</li><li><a title="Rob Ragan on Twitter" rel="nofollow" href="https://twitter.com/sweepthatleg">Rob Ragan on Twitter</a></li><li><a title="Rob Ragan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/robragan/">Rob Ragan on LinkedIn</a></li><li><a title="Bishop Fox Labs" rel="nofollow" href="https://bishopfox.com/labs">Bishop Fox Labs</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Seth Spergel on venture capital bets in cybersecurity</title>
  <link>http://securityconversations.fireside.fm/seth-spergel-merlin-ventures</link>
  <guid isPermaLink="false">1f02640b-edf7-4549-8012-6764dcca018d</guid>
  <pubDate>Tue, 21 Nov 2023 10:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1f02640b-edf7-4549-8012-6764dcca018d.mp3" length="17151625" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the firmware security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Seth Spergel is managing partner at Merlin Ventures, where he is responsible for identifying cutting-edge companies for Merlin to partner with and invest in. In this episode, Seth talks about helping startups target US federal markets, the current state of deal sizes and valuations, and the red-hot sectors in cybersecurity ripe for venture investment.</itunes:subtitle>
  <itunes:duration>28:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1f02640b-edf7-4549-8012-6764dcca018d/cover.jpg?v=1"/>
  <description>&lt;p&gt;&lt;strong&gt;Episode sponsors:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Binarly (&lt;a href="https://binarly.io" target="_blank" rel="nofollow noopener"&gt;https://binarly.io&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;FwHunt (&lt;a href="https://fwhunt.run" target="_blank" rel="nofollow noopener"&gt;https://fwhunt.run&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Seth Spergel is managing partner at Merlin Ventures, where he is responsible for identifying cutting-edge companies for Merlin to partner with and invest in. In this episode, Seth talks about helping startups target US federal markets, the current state of deal sizes and valuations, and the red-hot sectors in cybersecurity ripe for venture investment.&lt;/p&gt;
</description>
  <itunes:keywords>Venture capital, Merlin Ventures, investments, Artifical Intelligence</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Seth Spergel is managing partner at Merlin Ventures, where he is responsible for identifying cutting-edge companies for Merlin to partner with and invest in. In this episode, Seth talks about helping startups target US federal markets, the current state of deal sizes and valuations, and the red-hot sectors in cybersecurity ripe for venture investment.</p><p>Links:</p><ul><li><a title="Seth Spergel bio" rel="nofollow" href="https://merlin.vc/team/seth-spergel/">Seth Spergel bio</a> &mdash; Seth has more than 20 years of experience building, selling, and investing in software and startups. Prior to Merlin Ventures, Seth was VP for Infrastructure Technologies at In-Q-Tel, a strategic investment firm that invests in startups that meet the mission needs of government customers. </li><li><a title="Merlin Ventures portfolio" rel="nofollow" href="https://merlin.vc/portfolio/">Merlin Ventures portfolio</a></li><li><a title="Palo Alto buys Talon, Dig Security" rel="nofollow" href="https://www.securityweek.com/palo-alto-to-acquire-talon-intensifying-competition-in-cloud-data-security/">Palo Alto buys Talon, Dig Security</a> &mdash; Technology powerhouse Palo Alto Networks is officially on a billion-dollar shopping spree in the cloud data security space.</li><li><a title="Episode Sponsor: Binarly" rel="nofollow" href="https://binarly.io/capabilities/index.html">Episode Sponsor: Binarly</a> &mdash; The Binarly REsearch team leads the industry in firmware vulnerability disclosure and advisories</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Seth Spergel is managing partner at Merlin Ventures, where he is responsible for identifying cutting-edge companies for Merlin to partner with and invest in. In this episode, Seth talks about helping startups target US federal markets, the current state of deal sizes and valuations, and the red-hot sectors in cybersecurity ripe for venture investment.</p><p>Links:</p><ul><li><a title="Seth Spergel bio" rel="nofollow" href="https://merlin.vc/team/seth-spergel/">Seth Spergel bio</a> &mdash; Seth has more than 20 years of experience building, selling, and investing in software and startups. Prior to Merlin Ventures, Seth was VP for Infrastructure Technologies at In-Q-Tel, a strategic investment firm that invests in startups that meet the mission needs of government customers. </li><li><a title="Merlin Ventures portfolio" rel="nofollow" href="https://merlin.vc/portfolio/">Merlin Ventures portfolio</a></li><li><a title="Palo Alto buys Talon, Dig Security" rel="nofollow" href="https://www.securityweek.com/palo-alto-to-acquire-talon-intensifying-competition-in-cloud-data-security/">Palo Alto buys Talon, Dig Security</a> &mdash; Technology powerhouse Palo Alto Networks is officially on a billion-dollar shopping spree in the cloud data security space.</li><li><a title="Episode Sponsor: Binarly" rel="nofollow" href="https://binarly.io/capabilities/index.html">Episode Sponsor: Binarly</a> &mdash; The Binarly REsearch team leads the industry in firmware vulnerability disclosure and advisories</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
